ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Issues
/
Volume 17, Number 06, November 2020
Volume
17
..............................
November
2020
..............................
Number
06
..............................
Downloads
0
..............................
Views
929
..............................
Share
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
A Dynamic Particle Swarm Optimisation and Fuzzy Clustering Means Algorithm for
Segmentation of Multimodal Brain Magnetic
#Fuzzy c-mean
# particle swarm optimization
# brain Magnetic Resonance Images segmentation
Traceable Signatures using Lattices Thakkalapally Preethi and Bharat Amberker
Department of Computer Science and Engineering, National Institute of Technology Warangal, India
#Traceable Signatures
# Lattices
# Short Integer Solution
# Learning with Errors
A Sentiment Analysis System for the Hindi Language by Integrating Gated Recurrent Unit
with Genetic Algorithm
#Sentiment analysis
# Hindi language
# multilingual
# deep learning
# gated recurrent unit
# genetic algorithm
Computer Vision-based Early Fire Detection Using Enhanced Chromatic Segmentation and Optical Flow
Analysis Technique
#Fire detection
# color segmentation
# shape analysis
# optical flow analysis
# Lucas-Kanade tracker
# neural network
A Deep Learning Approach for the Romanized Tunisian Dialect Identification
Jihene Younes1, Hadhemi Achour1, Emna Souissi2, and Ahmed Ferchichi1 1Université de Tunis, ISGT, Tunisia 2Université de Tunis, ENSIT, Tunisia
#Tunisian dialect
# language identification
# deep learning
# BLSTM
# CRF
# natural language processing
Polynomial Based Fuzzy Vault Technique for Template Security in Fingerprint Biometrics
Reza Mehmood and Arvind Selwal
#Biometrics
# Fingerprint
# Template Security
# Crypto-System
# Fuzzy vault
Enriching Domain Concepts with Qualitative Attributes: A Text Mining based Approach
Niyati Kumari Behera and Guruvayur Suryanarayanan Mahalakshmi
#Information retrieval
# text mining
# qualitative attribute
# adjectives
# natural language processing
F0 Modeling for Isarn Speech Synthesis using Deep Neural Networks and Syllable-level Feature
Representation
#Fundamental frequency
# speech synthesis
# deep neural networks
Design and Implementation of Crypt Analysis of Cloud Data Intrusion Management System
Dinesh Elangovan and Ramesh Muthiya
#Cloud computing
# Pattern Matching Technique
# Blowfish Algorithm
# Hybrid Grey Wolf Optimization
# Firefly Technique
Wrapper based Feature Selection using Integrative Teaching Learning Based Optimization Algorithm
Mohan Allam and Nandhini Malaiyappan
#Feature Selection
# Integrative Teaching Learning based Optimization
# Genetic Algorithm
# Breast Cancer
An Investigative Analysis on Finding Patterns in Co-Author and Co-Institution Networks for LIDAR
Research
#Social network analysis
# co-institution
# co-authorship
# LIDAR
# degree
# closeness
# Eigenvector
Specification of Synchronous Network Flooding in Temporal Logic
Ra’ed Bani Abdelrahman1, Rafat Alshorman2, Walter Hussak3, and Amitabh Trehan3
#Network flooding
# linear temporal logic
# model checking
Recurrence Quantification Analysis of Glottal
#Glottal Signal
# Recurrence Quantification Analysis
# Saarbrucken Voice Database
# PSO-SVM
# Pathological Voice Detection
Synthesizing Conjunctive and Disjunctive Linear Invariants by K-means++ and SVM
Shengbing Ren and Xiang Zhang
#Software verification
# conjunctive invariant
# disjunctive invariant
# k-means++
# SVM
A Self-Healing Model for QoS-aware Web Service Composition
Doaa Elsayed1, Eman Nasr3, Alaa El Ghazali4, and Mervat Gheith2
#Web service composition
# self-healing
# quality of service
# user requirements
# K-means clustering
Unified Inter-Letter Steganographic Algorithm, A Text-based Data Hiding Method
Ahmad Esmaeilkhah1, Changiz Ghobadi1, Javad Nourinia1, and Maryam Majidzadeh2
#Steganography
# UILS
# InLetSteg
# Reverse extraction attack
# Unicode space character
# Inter-letter spacing
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint